G07C9/215

SYSTEM AND COMPUTER READABLE MEDIA ENABLING METHODS FOR PERMITTING A REQUEST AFTER VERIFYING KNOWLEDGE OF FIRST AND SECOND SECRETS

Systems and Computer Readable Media for enabling methods for multi-party authorization including a security component determining that a request for the performance of an action on a computing device is from a first party. The security component initiates transmissions to the computing device of first and second information indicating knowledge of first and second secrets provisioned on the computing device. The computing device, upon verifying the knowledge of first and second secrets, then permits the requested action.

Method and apparatus for finding and accessing an access station

A method for access control accepts a first data from a first mobile computing device of a first patron. The first data is representative of at least a certificate and represents an authorization for access. The method further provides the access in response to the first data, and makes a record in the first station. The record includes a second data representing the access and an identifying portion of the certificate. The method further provides, after the access, a third data to a second mobile computing device of any patron. The third data is deliverable by the second mobile computing device to the management system and is representative of the record. The method further accepts a fourth data that is representative of at least an acknowledgment of the record, and deletes the record from the first station in response to the fourth data.

Smart parking lot system

One or more non-transitory computer-readable storage media having instructions stored thereon that, when executed by one or more processors, cause the one or more processors to detect a vehicle that enters into a parking lot, identify an individual associated with the vehicle, retrieve context information corresponding to the individual, dynamically determine a first parking space based on the context information and available parking spaces, and provide the individual with directions to the first parking space.

CO-SIGNING DELEGATIONS
20220028198 · 2022-01-27 ·

It is provided a method for controlling access to a physical space using a co-sign delegation. The method is performed in a lock device and comprises the steps of: receiving an access request from an electronic key; obtaining a plurality of delegations, wherein each delegation is a delegation from a delegator to a delegatee, the plurality of delegations collectively forming a chain of delegations; determining that a delegation is a co-sign delegation, indicating that all further delegations need to be cryptographically signed by both the delegator of the respective delegation and by an access controller; and granting access to the physical space when the chain of delegations start in an owner of the lock device and ends in the S electronic key; and when all delegations in the chain of delegations after the co-sign delegation are cryptographically signed by both the delegator of the respective delegation and by the access controller.

Autonomous Mobile Delivery Robot And Chain Of Custody System

Disclosed are a system and a method that includes a robotic unit configured to deliver items (e.g., medicine, foodstuff, linens, equipment, etc.) to sites (e.g., rooms, offices, etc.) and/or individuals (e.g., patients, pharmacists, technician, etc.) throughout a facility (e.g., hospital, office building, mailroom, manufacturing facility, etc.). The robotic unit is a mobile unit that operates autonomously to follow predetermined or programmed routes throughout the facility to deliver the items. The system is configured to maintain a chain of custody for the items. In addition, the robotic unit is configured to only allow designated items to be delivered to designated sites and/or to authorized individuals. This can be achieved by the robotic unit having a plurality of containers that are locked within a storage space of the robotic unit, and are only accessible upon successful completion of an authorization process.

Access control system and method for use by an access device

Systems and methods are provided to allow a smart phone or any terminal to activate a door lock using a web site or server computer system. An access control system is provided that includes a server and an access device. The access device includes a processor and a communication module. The process has control of a door lock and is able to receive a reservation certificate presented by a portable terminal through the communication module. The processor activates the door lock when a current reservation certificate has been presented.

Interactive image-based communication using image coding
11783442 · 2023-10-10 · ·

Embodiments of a system and method for interactive barcode communication are described. In one embodiment, a mobile device presents a barcode to an information or transaction receptacle associated with the point of entry device. One embodiment provides for a method of transmitting data from an unconnected point of access device using an interactive barcode communication system on a mobile device, where the method comprises accessing a set of data on a point of access device, wherein the point of access device is unconnected from a data network with access to a central system database; dividing the set of data into multiple sections; incorporating the multiple sections into scan images for display during per-user transactions at the point of access device; and displaying the point of access data along with per-user transaction data during an interactive barcode communication transaction.

Cloud door lock control system with identification of time varied 2D codes
11783649 · 2023-10-10 ·

A cloud door lock control system with identification of time varied 2D codes is provided. A cloud device transmits the encryption codes of doors to be opened, the time periods for opening the doors, and the user's encryption codes to the handset through a communication channel and the handset stores these values in a memory. A mobile phone APP receives these values and encrypts them by using a specific encrypting code. The encoding way for the encoding unit is time varied, that is, the QR code from the encoding unit is only retained for a preset time period; after the preset time period has elapsed, the encoding unit generates another QR code. When the cloud device receives the QR code from a card reader, it is decoded. These decoded data is compared with those stored in the cloud device to determine whether the door is necessary to be opened.

Smart building automation system with digital signage

One or more non-transitory computer-readable storage mediums having instructions stored thereon that, when executed by one or more processors, cause the one or more processors to receive, from a sensor, identifying information associated with an individual, query a database to retrieve context information corresponding to the individual, the database comprising a number of entities corresponding to two or more of spaces, equipment, people, or events and a number of relationships between the entities, the context information determined based on the entities and relationships of the database, determine a purpose of the individual based on the context information, dynamically generate a user interface element for a display based on the purpose of the individual, and control the display to display the user interface element.

Distributed one-time-use entry code generation for physical access control method of operation and mobile systems
11777996 · 2023-10-03 · ·

A physical access control system enables acceptable portal entry codes upon receiving each physical access request by operating on the elapsed time from a previous physical access request to generate a temporal credential. The controller receives a plurality of physical access requests from a plurality of mobile application devices. Upon authenticating the first access request, the controller eliminates repetition from the space of acceptable successor requests from each mobile application device. Monotonic nonces advance the range of temporal code matches. Entry code generation is decentralized to distributed application devices and is inherently unknowable until a successor access request is initiated by the same application device.